Installing AVG Firewall - What protocols should I allow?

Posted on 2006-10-30
Medium Priority
Last Modified: 2012-08-13
I am installing the AVG Internet Protection Firewall as part of their new Internet Security 7.5.  I’m actually testing it to see if it would be good for my customers, many of whom know little about computers and want to know even less – so programs that are easy to use is very important.  These are not businesses for the most part, but home users.  Some run small home offices.  I am also going more and more toward working on client’s computers remotely using Symantec’s PC anywhere.  

At the beginning of the installation it goes through your computer and marks what functions, applications and protocols it thinks it should or shouldn’t allow access to the Internet.  On my computer the ones it’s marked to limit access are: Ident service, Internet Connection Sharing, L2TP VPN, Microsoft File Sharing and Printing, Novell Netware Client, PPTP VPN, Protocol AH (authentication header), Protocol ESP, Protocol GRE, Remote Administrator 2, Remote Desktop Server, Replies on ICMP diagnostics, Web Server Apache 2, Windows RPC Service.  

My question is whether or not I need any of these to have access to the Internet and whether or not my clients will need any of these to have access to the Internet, especially if I use Symantec PC Anywhere. I also need to update my own web site using ftp95pro.

Question by:alanlsilverman
LVL 31

Accepted Solution

moorhouselondon earned 1000 total points
ID: 17843396
PCAnywhere uses Ports 5631 and 5632 so the firewall needs to allow these.

Author Comment

ID: 17894677

Featured Post

Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

In this article, we will show how to detach and attach a database and then show how to repair a corrupt database and attach it, If it has some errors. We will show how to detach and attach using SSMS or using T-SQL sentences.
There’s hardly a doubt that Business Communication is indispensable for both enterprises and small businesses, and if there is an email system outage owing to Exchange server failure, it definitely results in loss of productivity.
The viewer will learn how to successfully create a multiboot device using the SARDU utility on Windows 7. Start the SARDU utility: Change the image directory to wherever you store your ISOs, this will prevent you from having 2 copies of an ISO wit…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

588 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question